General

  • Target

    4b8a14d76f8267ef6ccfab67a1425efc470138e9fae7b4f72e878de4050806f9

  • Size

    4.8MB

  • Sample

    241118-rsbdqsybpb

  • MD5

    716b54f54884014e4b4a3752d5c29c27

  • SHA1

    20daa62a43bb71dfd2fddb73a5e3266f7b45bc37

  • SHA256

    4b8a14d76f8267ef6ccfab67a1425efc470138e9fae7b4f72e878de4050806f9

  • SHA512

    30b39f3c333ee45cdabcb7c022a16628923bccb4ee7f785f9ae7b95fd488244ad4f0a64114417c57205a5d77d0a6d9d09d3fae907bb09f0c542a4df2954c2852

  • SSDEEP

    98304:NHVNQ7L47z/NnsJqDeggUEA7/zYYZrk9VbVTyO7ecYB+CiFAw:nh7zln7ihVGzYYk9NVTyO6cYBWFAw

Malware Config

Targets

    • Target

      4b8a14d76f8267ef6ccfab67a1425efc470138e9fae7b4f72e878de4050806f9

    • Size

      4.8MB

    • MD5

      716b54f54884014e4b4a3752d5c29c27

    • SHA1

      20daa62a43bb71dfd2fddb73a5e3266f7b45bc37

    • SHA256

      4b8a14d76f8267ef6ccfab67a1425efc470138e9fae7b4f72e878de4050806f9

    • SHA512

      30b39f3c333ee45cdabcb7c022a16628923bccb4ee7f785f9ae7b95fd488244ad4f0a64114417c57205a5d77d0a6d9d09d3fae907bb09f0c542a4df2954c2852

    • SSDEEP

      98304:NHVNQ7L47z/NnsJqDeggUEA7/zYYZrk9VbVTyO7ecYB+CiFAw:nh7zln7ihVGzYYk9NVTyO6cYBWFAw

    • Detect Socks5Systemz Payload

    • Socks5Systemz

      Socks5Systemz is a botnet written in C++.

    • Socks5systemz family

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks